BugBounty & Hacking Resources
@projectzeroTM
1.18K
subscribers
22
photos
2
videos
5
files
362
links
Download Telegram
Join
BugBounty & Hacking Resources
1.18K subscribers
BugBounty & Hacking Resources
https://www.atredis.com/blog/2025/2/18/advisory-blog-series
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_secure_defenders_of_2024/
DARKNAVY
The Most "Secure" Defenders of 2024
In the increasingly intense offense and defense confrontation of 2024, security software has always been regarded as an important cornerstone of the corporate security defense line. However, these security softwares themselves may also have vulnerabilities…
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_unstoppable_offensive_and_defensive_trend_of_2024/
DARKNAVY
The Most Unstoppable Offensive and Defensive Trend of 2024
In recent years, the evolution of vulnerabilities and defense techniques has been continuous. From the days when a simple stack overflow could compromise a system, to the present day, where sophisticated techniques are necessary to bypass multiple layers…
❤
1
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-73px-m3vw-mr35
GitHub
PaloAlto OpenConfig Plugin: Command Injection Vulnerability
### Summary
A vulnerability in PAN-OS OpenConfig allows an authenticated user to run arbitrary commands on the underlying OS. The commands are run as device administrator.
### Details
Palo A...
❤
1
👍
1
BugBounty & Hacking Resources
https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-mvqj
GitHub
RSync: Heap Buffer Overflow, Info Leak, Server Leaks, Path Traversal and Safe links Bypass
### Summary
In this report, we describe multiple vulnerabilities we discovered in Rsync.
The first pair of vulnerabilities are a [Heap Buffer Overflow](https://nvd.nist.gov/vuln/detail/cve-202...
❤
1
BugBounty & Hacking Resources
https://www.darknavy.org/darknavy_insight/the_most_frustrating_vulnerability_disclosure_of_2024/
DARKNAVY
The Most Frustrating Vulnerability Disclosure of 2024
In the field of cybersecurity, vulnerability disclosure has long been regarded as a crucial step in safeguarding users. However, in practice, this process is fraught with controversy and contradictions. What truly constitutes “responsible disclosure”? When…
❤
1
BugBounty & Hacking Resources
https://www.synacktiv.com/en/publications/lsa-secrets-revisiting-secretsdump
Synacktiv
LSA Secrets: revisiting secretsdump
❤
1
BugBounty & Hacking Resources
https://portswigger.net/research/shadow-repeater-ai-enhanced-manual-testing
PortSwigger Research
Shadow Repeater:AI-enhanced manual testing
Have you ever wondered how many vulnerabilities you've missed by a hair's breadth, due to a single flawed choice? We've just released Shadow Repeater, which enhances your manual testing with AI-powere
❤
1
🔥
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
Check Point Research
The Cat and Mouse Game: Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions - Check Point Research
Executive Summary Why We Care about Sandbox Emulation As a discipline, information security involves a vast web of entry vectors, mitigations, and counter-mitigations. Among these, one of the most impactful points of conflict between attackers and defenders…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/the-bybit-incident-when-research-meets-reality/
Check Point Research
The Bybit Incident: When Research Meets Reality - Check Point Research
Research by Dikla Barda, Roman Ziakin and Oded Vanunu On February 21st, Check Point Blockchain Threat Intel System alerted on a critical attack log on the Ethereum blockchain network. The log indicated that the AI engine identify anomality change with this…
❤
1
BugBounty & Hacking Resources
https://codeanlabs.com/blog/research/exploiting-libreoffice-cve-2024-12425-and-cve-2024-12426/
Codean Labs
Exploiting LibreOffice (CVE-2024-12425 and CVE-2024-12426) — Codean Labs
Attackers can write semi-arbitrary files in the filesystem, and remotely extract values from environment variables and from INI-like files in the filesystem via two vulnerabilities in LibreOffice. Both occur upon loading the document, without any user interaction.…
❤
1
BugBounty & Hacking Resources
https://bxmbn.medium.com/bank-offer-idor-fix-bypassed-how-i-accessed-unauthorized-offers-and-secured-a-10-000-bounty-41052b31a2fc
Medium
Bank offer IDOR Fix Bypassed: How I Accessed Unauthorized Offers and Secured a $10,000 Bounty — @bxmbn
Bank offer IDOR Fix Bypassed: How I Accessed Unauthorized Offers and Secured a $10,000 Bounty — @bxmbn Summary: I discovered a new weakness in the offer retrieval functionality that allows an …
❤
1
BugBounty & Hacking Resources
https://bxmbn.medium.com/hijacking-sessions-with-idor-and-xss-bxmbn-396f99761a85
Medium
Hijacking Sessions with IDOR and XSS— @bxmbn
Picture a platform designed to handle sensitive documentation — think insurance claims or identity verification — turning into a goldmine…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/large-scale-exploitation-of-legacy-driver/
Check Point Research
Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign - Check Point Research
Highlights Introduction While the abuse of vulnerable drivers has been around for a while, those that can terminate arbitrary processes have drawn increasing attention in recent years. As Windows security continues to evolve, it has become more challenging…
❤
1
BugBounty & Hacking Resources
https://x.com/0xnxenon/status/1893938473901367687
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/how-an-attacker-drained-50m-from-a-defi-protocol-through-role-escalation/
Check Point Research
How an Attacker Drained $50M from a DeFi Protocol Through Role Escalation - Check Point Research
By: Dikla Barda, Roaman Zaikin & Oded Vanunu After reviewing the off-chain forensic report, we can now provide additional insights into the Bybit attackmechanism. Security researchers have determined that hackers injected malicious JavaScript directly into…
❤
1
BugBounty & Hacking Resources
http://hdl.handle.net/2142/110288
❤
1
BugBounty & Hacking Resources
https://hdl.handle.net/1721.1/152860
❤
1
BugBounty & Hacking Resources
https://labs.watchtowr.com/the-best-security-is-when-we-all-agree-to-keep-everything-secret-except-the-secrets-nakivo-backup-replication-cve-2024-48248/
watchTowr Labs
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248)
As an industry, we believe that we’ve come to a common consensus after 25 years of circular debates - disclosure is terrible, information is actually dangerous, it’s best that it’s not shared, and the only way to really to ensure that no one ever uses information…
❤
1
BugBounty & Hacking Resources
https://research.checkpoint.com/2025/modern-approach-to-attributing-hacktivist-groups/
Check Point Research
Modern Approach to Attributing Hacktivist Groups - Check Point Research
Research by: Itay Cohen (@megabeets_) Over the past few decades, hacktivism has been, in a lot of cases, characterized by minor website defacements and distributed denial-of-service (DDoS) attacks, which, while making headlines, had minimal lasting impact.…
❤
1
BugBounty & Hacking Resources
https://www.synacktiv.com/en/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking
Synacktiv
Taking the relaying capabilities of multicast poisoning to the next
❤
1
TWeb.init({scrollToPost:'projectzeroTM/276'});